Ihre E-Mail wurde erfolgreich gesendet. Bitte prüfen Sie Ihren Maileingang.

Leider ist ein Fehler beim E-Mail-Versand aufgetreten. Bitte versuchen Sie es erneut.

Vorgang fortführen?

Exportieren
Filter
Datenlieferant
Materialart
Sprache
Erscheinungszeitraum
  • 1
    ISBN: 9780833082657 , 0833086820 , 0833086847 , 0833086839 , 0833082655 , 9780833086839 , 9780833086846 , 9780833086822
    Sprache: Englisch
    Seiten: 1 Online-Ressource
    Serie: Research report (Rand Corporation) v. RR-381-A
    Paralleltitel: Print version Perry, Walter L Toppling the Taliban
    Schlagwort(e): Afghan War, 2001- Campaigns ; Afghan War, 2001- Aerial operations, American ; Postwar reconstruction ; Operation Enduring Freedom, 2001- ; Afghan War, 2001- ; Afghan War, 2001- ; Postwar reconstruction ; Operation Enduring Freedom, 2001- ; Afghan War (2001- ) ; Operation Enduring Freedom (2001- ) ; HISTORY ; Asia ; Central Asia ; HISTORY ; Asia ; General ; Military campaigns ; Military operations, Aerial ; American ; Postwar reconstruction ; Afghanistan ; Electronic book
    Kurzfassung: The September 11, 2001, terrorist attacks caught the United States without a plan for military operations in Afghanistan. In less than 30 days, the Department of Defense created a plan that involved an unprecedented combination of special operations forces (SOF), Afghan fighters, and airpower. Operations were initiated on October 7, and Afghanistan's Taliban government was toppled in less than two months. An interim administration was installed on December 22, and civil-military operations began. This report describes the preparations for Operation Enduring Freedom at CENTCOM and elsewhere, Army operations and support activities, building a coalition, and civil-military operations in Afghanistan through the end of June 2002. The research used contemporary records and interviews with key participants to gain authoritative perspectives on events and issues
    Kurzfassung: Cover; Title Page; Copyright; Contents; Preface; Figures and Tables; Summary; Acknowledgments; Glossary of Terms and Abbreviations; CHAPTER ONE: Introduction; A Different Kind of War for U.S. Forces; Other Military Demands of the War on Terrorism; Homeland Security; Force Protection; The War on Terrorism Outside Central Asia; Meeting the Manpower Requirements; The Area of Operations; About This Report; Purpose; Organization of This Report; CHAPTER TWO: Laying the Groundwork; The Strategic Context; Building and Managing the Coalition; The Coalition; Indigenous Partners; Joint and Covert Forces
    Kurzfassung: Intelligence, Surveillance, and ReconnaissanceRole of the CIA; Unmanned Aircraft Systems; Intelligence Fusion Centers; Intelligence Failures; Air Operations; Basing; Control of Air Assets; The Bombing Campaign; Air-Ground Operations with Anti-Taliban Forces; Mazar-e Sharif; Kandahar; The Collapse of the Taliban; Role of Special Forces; Air and Air-Ground Operations; Conventional Ground Forces; Marines; Army Forces; Logistics; Concurrent Humanitarian Operations; The Detainees; Treatment of Detainees; National Detainee Database; Treatment in Afghanistan Facilities; Rules for the Use of Force
    Kurzfassung: Intelligence, Surveillance, and ReconnaissanceRole of the CIA; Unmanned Aircraft Systems; Intelligence Fusion Centers; Intelligence Failures; Air Operations; Basing; Control of Air Assets; The Bombing Campaign; Air-Ground Operations with Anti-Taliban Forces; Mazar-e Sharif; Kandahar; The Collapse of the Taliban; Role of Special Forces; Air and Air-Ground Operations; Conventional Ground Forces; Marines; Army Forces; Logistics; Concurrent Humanitarian Operations; The Detainees; Treatment of Detainees; National Detainee Database; Treatment in Afghanistan Facilities; Rules for the Use of Force
    Kurzfassung: Treatment at Camp X-RayThe Debate over Detainee Status-The U.S. Position; Arguments Against U.S. Policy; Implications; Observations; Command and Control; Intelligence, Surveillance, and Reconnaissance; The Coalition; Humanitarian Assistance; Treatment of Detainees; CHAPTER FOUR: Hunting Down Taliban and Al Qaeda Remnants; Control of Ground Forces; Task Force 58; Formation of Task Force 58; Coordinating Operations with Pakistan; Joint and Coalition Operations; FOB Rhino; Operations; Taking the Kandahar Airport; Sensitive Site Exploitations; Detainee Operations5; Air Support Operations
    Kurzfassung: The September 11, 2001, terrorist attacks caught the United States without a plan for military operations in Afghanistan. In less than 30 days, the Department of Defense created a plan that involved an unprecedented combination of special operations forces (SOF), Afghan fighters, and airpower. Operations were initiated on October 7, and Afghanistan's Taliban government was toppled in less than two months. An interim administration was installed on December 22, and civil-military operations began. This report describes the preparations for Operation Enduring Freedom at CENTCOM and elsewhere, Army operations and support activities, building a coalition, and civil-military operations in Afghanistan through the end of June 2002. The research used contemporary records and interviews with key participants to gain authoritative perspectives on events and issues
    Anmerkung: Includes bibliographical references , English
    URL: Volltext  (kostenfrei)
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 2
    Online-Ressource
    Online-Ressource
    Santa Monica, CA : Rand Corporation
    ISBN: 9780833076199 , 0833084577 , 0833080741 , 0833076191 , 9780833080745 , 9780833084576
    Sprache: Englisch
    Seiten: 1 Online-Ressource (xxvi, 120 pages)
    Serie: RAND Corporation technical report series TR-1253-OSD
    Paralleltitel: Print version Allocating Marine Expeditionary Unit equipment and personnel to minimize shortfalls
    Schlagwort(e): United States Equipment ; United States ; United States ; TECHNOLOGY & ENGINEERING ; Military Science ; Armed Forces ; Equipment and supplies ; Electronic books
    Kurzfassung: For various reasons, including the commander's priorities and expected mission requirements, U.S. Marine Corps amphibious lift requirements, that is, the space needed on ships to transport equipment for a given mission, may exceed the U.S. Navy's lift capacity. Thus, Marine Expeditionary Units (MEUs) afloat generally do not have all their support personnel and equipment on board. What is the impact of this shortfall on a MEU's ability to complete the tasks associated with its mission, especially when the mission includes reconstruction and stabilization operations? Close examination reveals that, in general, MEUs do not fail as a result of these equipment shortfalls; Marine Corps commanders are able to make use of the equipment they have in innovative and creative ways to accomplish the tasks at hand. However, equipment shortfalls do force shortcuts and sometimes sacrifice the quality and speed of task completion. This report describes the development of an automated tool for allocating both equipment and personnel to complete the tasks associated with 15 MEU missions, highlighting the associated equipment implications
    Kurzfassung: For various reasons, including the commander's priorities and expected mission requirements, U.S. Marine Corps amphibious lift requirements, that is, the space needed on ships to transport equipment for a given mission, may exceed the U.S. Navy's lift capacity. Thus, Marine Expeditionary Units (MEUs) afloat generally do not have all their support personnel and equipment on board. What is the impact of this shortfall on a MEU's ability to complete the tasks associated with its mission, especially when the mission includes reconstruction and stabilization operations? Close examination reveals that, in general, MEUs do not fail as a result of these equipment shortfalls; Marine Corps commanders are able to make use of the equipment they have in innovative and creative ways to accomplish the tasks at hand. However, equipment shortfalls do force shortcuts and sometimes sacrifice the quality and speed of task completion. This report describes the development of an automated tool for allocating both equipment and personnel to complete the tasks associated with 15 MEU missions, highlighting the associated equipment implications
    Anmerkung: "Prepared for the Office of the Secretary of Defense , "RAND National Defense Research Institute , Includes bibliographical references (pages 119-120)
    URL: Volltext  (kostenfrei)
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 3
    ISBN: 9780833034892 , 0833036165 , 0833034898 , 9780833036162
    Sprache: Englisch
    Seiten: 1 Online-Ressource (1 volume)
    Paralleltitel: Print version Perry, Walt L Exploring information superiority
    Schlagwort(e): Information warfare ; Command and control systems ; Information warfare ; Command and control systems ; TECHNOLOGY & ENGINEERING ; Military Science ; Command and control systems ; Information warfare ; Military Administration ; Military & Naval Science ; Law, Politics & Government ; United States ; HISTORY ; Military ; Biological & Chemical Warfare ; Electronic books
    Kurzfassung: Assessing how technology contributes to information superiority and decision dominance a major challenge, in part because it demands quantitative measures for what are usually considered qualitative concepts. The authors have developed a mathematical framework to aid these efforts. Additional work, such as data fitting, experimentation, linking decisions and actions, historical analysis, and gaming will further advance knowledge in this area
    Kurzfassung: Assessing how technology contributes to information superiority and decision dominance a major challenge, in part because it demands quantitative measures for what are usually considered qualitative concepts. The authors have developed a mathematical framework to aid these efforts. Additional work, such as data fitting, experimentation, linking decisions and actions, historical analysis, and gaming will further advance knowledge in this area
    Anmerkung: "MR-1467 , Includes bibliographical references
    URL: Volltext  (kostenfrei)
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 4
    Online-Ressource
    Online-Ressource
    Santa Monica, CA : RAND Corp
    ISBN: 9780833044563 , 0833045261 , 0833044567 , 9780833045263
    Sprache: Englisch
    Seiten: 1 Online-Ressource (xxv, 57 pages)
    Ausgabe: [S.l.] HathiTrust Digital Library 2010 Electronic reproduction
    Paralleltitel: Print version Perry, Walt L Analytic support to intelligence in counterinsurgencies
    Schlagwort(e): Military intelligence ; Insurgency ; Counterinsurgency ; Military intelligence ; Insurgency ; Counterinsurgency ; HISTORY ; Military ; Biological & Chemical Warfare ; POLITICAL SCIENCE ; Security (National & International) ; Counterinsurgency ; Insurgency ; Military intelligence ; Bekämpfung ; Unruhen ; United States ; Irak ; USA ; Electronic books
    Kurzfassung: Operations in Iraq and Afghanistan have shown that U.S. forces need more-effective techniques and procedures to conduct counterinsurgency. It is likely that U.S. forces will face similar, irregular warfare tactics from future enemies that are unwilling to engage in conventional combat with U.S. forces. This monograph examines the nature of the contemporary insurgent threat and provides insights on using operational analysis techniques to support intelligence operations in counterinsurgencies. The authors examine the stages of an insurgency and discuss the kinds of intelligence that are needed at each stage. A number of techniques--pattern discernment and predictive analysis, for example--appear to show promise of being useful to intelligence analysis. The authors also explore two closely connected methods in depth to examine the interactions between friendly and enemy forces: game theory and change detection
    Kurzfassung: Operations in Iraq and Afghanistan have shown that U.S. forces need more-effective techniques and procedures to conduct counterinsurgency. It is likely that U.S. forces will face similar, irregular warfare tactics from future enemies that are unwilling to engage in conventional combat with U.S. forces. This monograph examines the nature of the contemporary insurgent threat and provides insights on using operational analysis techniques to support intelligence operations in counterinsurgencies. The authors examine the stages of an insurgency and discuss the kinds of intelligence that are needed at each stage. A number of techniques--pattern discernment and predictive analysis, for example--appear to show promise of being useful to intelligence analysis. The authors also explore two closely connected methods in depth to examine the interactions between friendly and enemy forces: game theory and change detection
    Anmerkung: "MG-682-OSD"--Page of cover , Includes bibliographical references (pages 55-57) , Use copy Restrictions unspecified star MiAaHDL , Electronic reproduction , Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.
    URL: Volltext  (kostenfrei)
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 5
    ISBN: 9780833078018 , 0833078011 , 9780833078025 , 0833078038 , 083307802X , 0833078003 , 9780833078001 , 9780833078032
    Sprache: Englisch
    Seiten: 1 Online-Ressource (xxv, 85 pages)
    Serie: Rand Corporation monograph series MG-1246-NRL
    Paralleltitel: Print version Perry, Walt L Predicting suicide attacks
    Schlagwort(e): Terrorists Suicidal behavior ; Terrorism ; Suicide bombings ; Terrorists ; Terrorism ; Suicide bombings ; POLITICAL SCIENCE ; Security (National & International) ; Suicide bombings ; Terrorism ; Terrorists ; Suicidal behavior ; Israel ; POLITICAL SCIENCE ; Political Freedom & Security ; Terrorism ; Electronic books
    Kurzfassung: "The Naval Research Laboratory (NRL) set out to develop ways to predict what determines the targets of suicide attacks. While the ultimate goal is to create a list of areas at risk for the U.S. environment, the first phase of development employed a data set from Israel. Initially, NRL focused on spatial attributes, creating its own risk index, but realized that this focus on the where ignored the broader social context, the why. The lab asked RAND to test, as a proof of principle, the ability of sociocultural, political, economic, and demographic factors to enhance the predictive ability of NRL's methodology. Again using Israel as a sample, RAND created a database that coded for these factors, then conducted both quantitative and qualitative analyses with an eye to determining what puts a given area at greater risk. The quantitative analysis established that these factors are related to the odds of attack within specific neighborhoods and that the relationships held even when controlling for geospatial factors, so they seem to confer risk for reasons beyond their association with geospatial features of neighborhoods. The specifics of the research are limited to the preferences of Palestinian suicide bombers in Israel; however, the methods used to assess target preferences in Israel could be transferred to the United States or other countries. Any results, if proven to be robust, could be used to develop recommendations for heightened public awareness in certain areas."--Page 4 of cover
    Kurzfassung: "The Naval Research Laboratory (NRL) set out to develop ways to predict what determines the targets of suicide attacks. While the ultimate goal is to create a list of areas at risk for the U.S. environment, the first phase of development employed a data set from Israel. Initially, NRL focused on spatial attributes, creating its own risk index, but realized that this focus on the where ignored the broader social context, the why. The lab asked RAND to test, as a proof of principle, the ability of sociocultural, political, economic, and demographic factors to enhance the predictive ability of NRL's methodology. Again using Israel as a sample, RAND created a database that coded for these factors, then conducted both quantitative and qualitative analyses with an eye to determining what puts a given area at greater risk. The quantitative analysis established that these factors are related to the odds of attack within specific neighborhoods and that the relationships held even when controlling for geospatial factors, so they seem to confer risk for reasons beyond their association with geospatial features of neighborhoods. The specifics of the research are limited to the preferences of Palestinian suicide bombers in Israel; however, the methods used to assess target preferences in Israel could be transferred to the United States or other countries. Any results, if proven to be robust, could be used to develop recommendations for heightened public awareness in certain areas."--Page 4 of cover
    Anmerkung: Includes bibliographical references (pages 83-85)
    URL: Volltext  (kostenfrei)
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 6
    ISBN: 9780833080929 , 0833083368 , 083308092X , 9780833083364
    Sprache: Englisch
    Seiten: 1 Online-Ressource (xliii, 258 pages)
    Paralleltitel: Available in another form
    Paralleltitel: Available in another form
    Schlagwort(e): Violence Forecasting ; Criminal behavior Research ; Methodology ; Terrorists Psychology ; Terrorists Social conditions ; Criminal behavior, Prediction of ; Terrorism Prevention ; Violence ; Criminal behavior ; Terrorists ; Terrorists ; Criminal behavior, Prediction of ; Terrorism ; Behavioral Research ; Behavioral Sciences ; Crime ; Criminology ; Disciplines and Occupations ; Natural Science Disciplines ; Psychiatry and Psychology ; Research ; Science ; Social Problems ; Social Sciences ; Sociology ; Terrorism ; Violence ; Anthropology, Education, Sociology and Social Phenomena ; Behavioral Disciplines and Activities ; Criminal behavior, Prediction of ; Social Welfare & Social Work ; Social Sciences ; SOCIAL SCIENCE ; Criminology ; Criminology, Penology & Juvenile Delinquency ; Terrorists ; Psychology ; Criminal behavior ; Research ; Methodology ; Terrorism ; Prevention ; Violence ; Forecasting ; Electronic books
    Kurzfassung: Government organizations have put substantial effort into detecting and thwarting terrorist and insurgent attacks by observing suspicious behaviors of individuals at transportation checkpoints and elsewhere. This report reviews the scientific literature relating to observable, individual-level behavioral indicators that might-along with other information-help detect potential violent attacks. The report focuses on new or nontraditional technologies and methods, most of which exploit (1) data on communication patterns, (2) "pattern-of-life" data, and/or (3) data relating to body movement and physiological state. To help officials set priorities for special attention and investment, the report proposes an analytic framework for discussion and evaluation; it also urges investment in cost-effectiveness analysis and more vigorous, routine, and sustained efforts to measure real-world effectiveness of methods. One cross-cutting conclusion is that methods for behavioral observation are typically not reliable enough to stand alone; success in detection will depend on information fusion across types of behaviors and time. How to accomplish such fusion is understudied. Finally, because many aspects of using behavioral observations are highly controversial, both scientifically and because of privacy and civil-liberties concerns, the report sharpens the underlying perspectives and suggests ways to resolve some of the controversy while significantly mitigating problems that definitely exist
    Kurzfassung: Government organizations have put substantial effort into detecting and thwarting terrorist and insurgent attacks by observing suspicious behaviors of individuals at transportation checkpoints and elsewhere. This report reviews the scientific literature relating to observable, individual-level behavioral indicators that might-along with other information-help detect potential violent attacks. The report focuses on new or nontraditional technologies and methods, most of which exploit (1) data on communication patterns, (2) "pattern-of-life" data, and/or (3) data relating to body movement and physiological state. To help officials set priorities for special attention and investment, the report proposes an analytic framework for discussion and evaluation; it also urges investment in cost-effectiveness analysis and more vigorous, routine, and sustained efforts to measure real-world effectiveness of methods. One cross-cutting conclusion is that methods for behavioral observation are typically not reliable enough to stand alone; success in detection will depend on information fusion across types of behaviors and time. How to accomplish such fusion is understudied. Finally, because many aspects of using behavioral observations are highly controversial, both scientifically and because of privacy and civil-liberties concerns, the report sharpens the underlying perspectives and suggests ways to resolve some of the controversy while significantly mitigating problems that definitely exist
    Anmerkung: "RAND National Security Research Division , "The research was conducted within the International Security and Defense Policy Center of the RAND National Defense Research Institute"--Title page verso , Includes bibliographical references (pages 225-258)
    URL: Volltext  (kostenfrei)
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
Schließen ⊗
Diese Webseite nutzt Cookies und das Analyse-Tool Matomo. Weitere Informationen finden Sie hier...